The dangers of distributed spam distraction

Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack. The post The dangers of distributed spam distraction appeared first on Health Security Solutions.
Read more

5 things to do to your new laptop

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start exploring your new toy. The post 5 things to do to your new laptop appeared first on Health Security Solutions.
Read more

Improving healthcare data storage

As more medical practices adopt electronic health records (EHR), running out of digital storage is becoming an increasingly common issue. HIPAA-regulated practices don’t always have the option of cloud solutions, but virtualization is a secure and cost-effective alternative. The post Improving healthcare data storage appeared first on Health Security Solutions.
Read more

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. The post Meltdown and Spectre fixes cause problems appeared first on Health Security Solutions.
Read more

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us! Cover up your webcam There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. The post Data safety: The non-technical way appeared first on Health Security Solutions.
Read more

Think before saving logins to your browser

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy. The post Think before saving logins to your browser appeared first on Health Security Solutions.
Read more

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. The post Phishers use encrypted sites to scam appeared first on Health Security Solutions.
Read more

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it. The post A keylogger found in HP laptops appeared first on Health Security Solutions.
Read more
Page 1 of 41234